Comparing Elliptic Curve Cryptography and RSA on 8-bit CPUs.
Nils GuraArun PatelArvinderpal WanderHans EberleSheueling Chang ShantzPublished in: CHES (2004)
Keyphrases
- elliptic curve cryptography
- public key
- elliptic curve
- cryptographic algorithms
- security analysis
- authentication scheme
- public key cryptography
- high security
- public key cryptosystems
- error correction
- digital watermark
- digital signature
- digital images
- image encryption
- user authentication
- authentication protocol
- secret key
- security requirements
- smart card